Software Requirement Specification

Size: px
Start display at page:

Download "Software Requirement Specification"

Transcription

1 Software Requirement Specification Publish/Subscribe System Group-03 Atul Jangra 2010CS50277 Dushyant Behl 2010CS50282 Shantanu 2010CS50295 Utkarsh 2010CS

2 1. Introduction Table of Content 1.1 Purpose Motivation Scope Glossary Overview Overall Description 2.1 Product Perspective System Interface User interface Hardware Interface Software Interface Communication Interfaces Memory Constraints Operations Product Functions Context Diagram Use Case Diagram Application Features User Characteristics Constraints Assumptions and Dependencies Specific Requirements 3.1 External interface Terminal Client Interface User Management Interface Account Creation Functional Requirements System Management System Monitoring Account Creation Account Removal Session Creation/Authorisation Message Sending Performance Requirements Logical Database Requirements

3 3.6 Design Constraints Software System Attributes Reliability Availability Security Maintainability Portability Organising Specific Requirements

4 1.0. Introduction 1.1. Purpose The purpose of this document is to present a detailed description of a publish/subscribe system,. It will explain the purpose and features of the system, the interfaces of the system, what the system will do, the constraints under which it must operate and how the system will react to external stimuli. This document is intended for both the stakeholders and the developers of the system Motivation of Project As the number of mobile devices is increasing, the number of users expressing interest in pub-sub system is increasing. To deal with the ever increasing demand of the users, a robust middleware software system is required which would be capable of handling the large number of users and, capable of scaling horizontally to keep the service cost effective Scope of Project This software system will be a middleware system for providing the pub-sub service. It will be designed to deliver published content to the users who have subscribed to it. The system will use a unique identification such as username to identify the users on terminal servers and then push content to the devices affiliated with that username. This project will enable users to get access to content which is according to their interest as well as it provides a platform to content publishers for reaching users. The project aims at developing this middleware independent of the operating system platform. The middleware is concerned with the content delivery aspect to the subscribers Glossary Java NIO: Java New I/O, usually called NIO, is a collection of Java programming language APIs that offer features for intensive I/O operations Pub/Sub: A publish subscribe system that delivers messages to a large group of users subscribed to a particular topic Middleware: Middleware is computer software that connects software components or some people and their applications Admin User: Administrator of the system 4

5 Terminal User: The subscribing user who will receive the messages and broadcast messages to specific rooms with permissions 1.5. Overview The next chapter, the Overall Description section, of this document gives an overview of the functionality of our system. It describes the informal requirements and is used to establish a context for the technical requirements specification in the next chapter. The third chapter, Requirements Specification, of this document is written primarily for the developers and describes in technical terms the details of the functionality of the system. Both sections of the document describe the same software system in its entirety, But are intended for different audiences and thus use different language Overall Description 2.1 Product Perspective This publish-subscribe pattern based middleware system relies on Java NIO API for implementation. This system will be used by enterprises for a variety of purposes such as data-push services, pub/sub broadcast services or any other service which needs multicasting messages to millions of users simultaneously. The system can simultaneously be used for a chat type application, where users would want to send real time text-based messages to each other. The system will be a layered-clustered environment capable of scaling each layer individually as depicted in the following schematic: 5

6 Figure 1: Schematic for the server design System Interface The system being developed will consist of the software application that will be running on the virtual/real hardware. The user of this system will need to follow the following steps: Arrange the desired hardware for the server system in the three layers, virtual or real. Connect the hardware together in an overlay network. Run the Java based programs on the terminal, data forwarding, and the data processing layers. Use an admin machine to monitor the working of the server system. 6

7 User Interface The primary user of this system will be the middleware administrator who will monitor the system s working and hence the user interface would be consist of the following. Options to view the live throughput across different data layers. Interface to view data throughput, connection counts and load monitoring for all the servers. Option to monitor a particular server periodically and also to take down a server in maintenance mode. Interface to replace a particular server with another server. Interface to add/remove new set of servers to a particular layer. Interface to control the connections of a server in any layer to the servers of the other layers Hardware Interface The Hardware involved in this system will be a set of real or virtual servers. This system will be compatible with virtual hardware services such as Amazon EC2 instances Software Interface The system has software interfaces spread across different layers of the system. The servers in different layers will be running software developed in JAVA on Linux based operating system. The administrator shall have a web based monitoring system so as to monitor the server system of Communication Interface The system will need a variety of communication interfaces: Communication between various parts of the clustered environment. This will be using TCP sockets to maintain the necessary communication. Communication of the system with the various users. More precisely, connection of the terminal server layer (Figure 1) with the users. This connection will be created by using java.net.serversocket and java.net.socket from the Java NIO API and will also be based on TCP sockets. 7

8 Memory Constraints Terminal Servers: The terminal nodes requires connecting to a target of over 1 Million clients simultaneously and hence the memory consumed in establishing connection to the clients must not be large so as to prevent overflowing the memory limit of the system. Data Processing/Data Forwarding Servers: The nodes in these layers should be memory efficient in such a way so as to handle maximum connections for the same memory limit. The memory limit here should be kept low so as to prevent the systems from thrashing. Admin End: The Administrator system will be running a simple web server for helping in management of the system, which will not be memory intensive and hence no specific memory requirements for this Operations 1. Terminal User Operations Create a new account - The user should be able to link existing third party accounts with his existing account, or create a new account in, using username and password as credentials. Manage Sessions - The user should be able to disconnect any existing session remotely, if he can t logout from the session from the Terminal Client. Authorize Persistent Socket - The user has to authorize himself on starting a new connection on a terminal server, using a service name, with his secret key (OAuth 2, in case of third party authorization). The user with this secret key must be already registered on the system. Send Message - The user can send message to another user, or a pub/sub room (if he has publishing permissions for the room). 2. Administrative User Operations Add a new server - Add a server instance in any layer on the already deployed system. Replace a server - Replace an existing server in the deployment for upgrading with zero-downtime. Get traffic information on any server Get number of clients connected on any terminal server 2.2. Product Functions The system aims to be a pub/sub system, and an XML based chat system at the same time. Any client that is connected on a terminal server is guaranteed to receive both types of messages, message published in rooms that he is subscribed to, 8

9 and messages sent to him directly. The client can have multiple simultaneous sessions, so that any message that is sent to him is received on all devices connected using his credentials Context Diagram Figure

10 Use Case Diagram: Figure Figure

11 Application Features: Terminal User The user can create a new account, or connect using a third party account like Twitter, Facebook or Google. The user can send messages to a specific user. The user can subscribe to various rooms which will be listed on the client-side application. The user can sign in using one of multiple third party accounts registered with his username. Admin Interface User The user can view the live throughput across different data layers. The user can view data throughput, and connection counts for all the servers. The user can monitor a particular server periodically and also to take down a server in maintenance mode. The user can replace a particular server with another server. The user can add/remove new set of servers to a particular layer.4 The user can control the connections of a server in any layer to the servers of the other layers User Characteristics The user in our system will be the System administrator of the enterprise using this system. This the user is required to know some basic shell scripting, networking and should be able to monitor the load of different servers used in the clustered environment. 2.4 Constraints The major constraints in this project would be the availability of hardware. Decent amount of hardware is needed for the testing of. 2.5 Assumptions and Dependencies We are assuming that the user will be able to tweak his Linux kernel to allow maximum number of sockets that can be created from the Machine. The software also depends on Java NIO APIs. If the API is modified then the developer will have to edit the software to make it compatible with the latest API. 11

12 3.0. Specific Requirements 3.1. External Interface The system has three primary interfaces - Terminal Clients - The users of the pub/sub system who will maintain a persistent socket connection to the deployed system. Any message that needs to be sent to the group of subscribed users, and / or a single user will have to be sent on this persistent socket connection. User Management Interface - This is a set of web APIs in system, through which new users may be registered, a particular user may manage sessions, a user may be unregistered, etc. Administrative Interface - The system will provide an administrative web interface, through which the administrator of the deployed system, will be able to manually change specific layer configurations, and also adjust parameters for individual servers, like maximum users to be connected to a particular server, etc Terminal Client Interface Authorization - Whenever a new user connects with the Terminal Client through a TCP socket, it is required to authorize itself for being able to send and receive any messages. The server will provide an XML interface that the Terminal Client will use for authorizing the socket connection. The server will authorize the Terminal Client on the credentials sent by the Terminal Client. Once a Terminal Client is authorized, the server will add that particular connection to the set of online connections associated a user, and any messages sent for this user will also be forwarded on this socket connection. Receiving Multicast Messages - The server will accept messages for subscription rooms by room administrators, through the terminal client s TCP socket. Every message that is received by the server should contain the target message room, or the usernames of target users. If the message is supposed to be sent to a room, the server checks if the sender has permissions to publish to a room, otherwise if the message is targeted to a set of users, the server checks if the sender has permissions to send to the targeted recipients, and then forwards the message. Sending Multicast Messages - The server will queue up the messages targeted for a specified username. If one or more Terminal Client instances associated with the username are connected, the message is immediately forwarded to the user on the Terminal Client socket connection. If no instance of a Terminal Client is connected for that particular user then the message may get stored in the 12

13 database temporarily (only if the message is directly targeted for the user, and not targeted for a room) User Management Interface User Registration - Any new user of the application will be prompted to create a new profile or login using any existing Gmail / Facebook / twitter account. The server will receive requests for registering the user and adding him to the database of existing users. Manage Session - A user may wish to log in (using the Gmail / Facebook / twitter account he registered with) and end existing user sessions. The server system will abruptly close the Terminal Client TCP socket on receiving such a request. Remove Account - The system will also provide APIs to allow the user to remove an account. When the user wishes to remove the account, the server will make him authorize again for security purposes Administrative Interface Connect Terminal Server System to Data Processing Server - The Administrative Web Interface will provide an option to add a Data Processing Server to the Terminal Server, so that the terminal server can load balance incoming traffic in Terminal Server Layer. Connect Data Processing Server to Data Forwarding Server - The interface will provide an option to connect a Data Forwarding Server with a Data Processing Server, so that the data processing server can forward the message body, after authorization, and finding specific Terminal Servers to which the message data is to be forwarded. Connect Data Forwarding Server to another Data Forwarding Server - The administrator should be able to connect different data forwarding servers with each other so that they may be able to send a message from any single terminal server to any other terminal server. 13

14 3.2. Functional Requirements Use Case: System Management: Introduction: Allow the system administrator to manage the system. This includes upgrading a particular server with another server, add/remove new set of servers to any layer and controlling the connections of a server in any layer to servers of the next layer. Actors: System Admin. Pre-Conditions: Administrator must be logged in to the web-based management system of. Post-Conditions: The action specified by the admin is performed and the system state is updated accordingly. Basic Flow: Action starts when the administrator issues a request. If the admin requests to upgrade a server then will start the node upgrade process which will acknowledge the admin after process completion accordingly. If the admin requests to add/remove new set of nodes to any layer then will ensure the process completion with proper acknowledgement. If the admin requests to reorder the connection of a node with other nodes in the next layer then also will ensure the connection reordering with proper acknowledgement Use Case: System Monitoring: Introduction: Allow the system administrator to monitor the state of the system. This includes monitoring any server / layer etc. Actors: System Admin. Pre-Conditions: Administrator must be logged in to the web-based management system of. Post-Conditions: The data asked by the system admin is provided to him through the same web-based interface. Basic Flow: Action starts when the administrator issues a request. 14

15 The data asked by the admin about any server / layer is passed on to the admin through the web based monitoring system. 15

16 3.2.3 Use Case: Account Creation: Introduction: Allow the terminal user to create a new account with. Actors: Terminal User. Pre-Conditions: None. Post-Conditions: A new user account would be registered with. Basic Flow: Action starts when a new user wants to create an account with. The Terminal user issues a request to create a new account with with user credentials. adds the new user to the registered users database. acknowledges the user that a new account has been created. Alternate Flow: User Already Registered If the user is already registered with the system send the user acknowledgement that the account is already registered with system state unchanged. Registration failure If the registration fails in between due to any reason then will tell the user about registration failure and simply ask him to register again Use Case: Account Removal: Introduction: Allow an already registered terminal user to delete account from. Actors: Terminal User. Pre-Conditions: User should be already registered with. Post-Conditions: The user account should be deleted from. Basic Flow: Action starts when a new user wants to delete his account from. The Terminal user issues a request to delete his account from. asks the user for user credentials to verify the actual user. The User provides the asked user credentials to verify his/her account. authenticates the user and delete his account from the system. 16

17 Alternate Flow: User Not Registered If the user is not registered with the system the authentication will fail and will send the acknowledgement that the account is not registered with leaving system state unchanged. Account deletion failure If the account deletion process fails in between due to any reason then will tell the user about process failure and simply ask him to restart the process again. Figure Use Case: Session Creation/Authorization Introduction: This use case corresponds to the creation of a new session by an already registered user. Actors: Terminal User. Pre-Conditions: User should be already registered with. Post-Conditions: A new user session would be established with the system. Basic Flow: Action starts when a new user wants to connect to. 17

18 The Terminal user issues a request to create a new session with. asks the user for user credentials to verify the actual user. The User provides the asked user credentials to verify his/her account. authenticates the user and establishes a new session with the system by creating a new TCP connection with the user through one of the terminal servers. Alternate Flow: User Not Registered If the user is not registered with the system the authentication will fail and will send the acknowledgement that the account is not registered with leaving system state unchanged. Session creation failure If the session creation fails in between due to any other reason then will close the sockets opened to connect to the user to free any stale used resources Use Case: Messaging Sending: Introduction: Allow the terminal user to send a message to another user registered on, or a publishing room in. Actors: Terminal Users. Pre-Conditions: The User sending the message should be connected to a terminal server, and authorized on the server. Post-Conditions: The message sent by the user will be delivered to intended recipients. If the recipient is offline the message is saved for room targeted messages, otherwise discarded for direct user messages. Basic Flow: Action starts when a connected user sends a message to be broadcast on a room. The Terminal User sends a message, along with the intended target. checks if the sender is authorized to publish the message in the given room, and publishes the message in the room accordingly. Alternate Flow: Intended target is another user checks if the sender has permissions to send the message to the intended recipient user, and sends the direct message accordingly. Intended target is not present will discard the message altogether. 18

19 Figure Performance Requirements Number of Users: Each terminal node is targeted to connect to 1 Million number of end users and maintain a persistent TCP connection to each user. Minimizing Latency: should also ensure that the latency between sending and receiving message through this system should be minimum, no matter how many recipients. Maximizing Throughput: should ensure maximum throughput through each of the nodes in the system, i.e. the data flow through each node should be maximized keeping latency as small as possible. Upgrading Nodes: should also ensure zero downtime upgrade for every node in the system. 3.4 Logical Database Requirements 19

20 For the process of authorisation at the terminal server, we need to store the user ID and the corresponding secret key for all the registered users. When a new user is registered, we need to add to database the new user ID and its secret key. For a particular user, we need to create columns for the different accounts which user could be using with our system. For each account, we need to store the login credential, which may be of following forms: Username and password in case of a simple account(not using OAuth). Username, appid, and secret authorisation key in case of services which using OAuth 2.0 such as Google, Facebook, and Twitter. For the case, when the user is not connected to the terminal server, we may need to store the message that is needed to be sent. The information about all the devices connected to a specific account is also needed to be stored in a database. The internal information about the different server will be stored. This will include the IP address of different machines, category (Terminal server, data forwarding layer, Data processing layer), and virtual ID of the machine. The message history of each room will also be saved in a database. Message history storage will not be done on the system in case of the direct messages. In this case, the history will be saved on the client side, so that it is available to the user. A table for different rooms will also be present. This table will contain all the necessary room-related information such as room administration, room members, room status messages, etc. 3.5 Design Constraints Not applicable 3.6 Software System Attributes Reliability Any message that is sent to the user has to be necessarily received by the user (provided that the user is connected). If the user is not connected then he may only receive the messages published to rooms instead of direct messages sent to him. 20

21 3.6.2 Availability The terminal users are supposed to maintain a persistent TCP socket connection with Terminal Servers, and the servers may receive messages to broadcast at any time. So, the complete system must be up and running always. Any upgrades to the system should have zero downtime Security The system must make sure that the users who are broadcasting messages to the rooms have publishing permissions for the room. If the user is sending a direct message to another user, he must have permissions to send direct messages to that user Maintainability The system has to provide an administrative interface so the layers can be connected with each other. The system should also allow upgrading with minimum downtime (for Terminal Servers), and zero downtime for other servers Portability Portability is not a requirement of this system, as the system is to be deployed once on any machine that can support Java Organizing specific requirements Not applicable. 21

Oracle WebLogic Server 12c: Administration I

Oracle WebLogic Server 12c: Administration I Oracle WebLogic Server 12c: Administration I Duration 5 Days What you will learn This Oracle WebLogic Server 12c: Administration I training teaches you how to install and configure Oracle WebLogic Server

More information

Security Guide Zoom Video Communications Inc.

Security Guide Zoom Video Communications Inc. Zoom unifies cloud video conferencing, simple online meetings, group messaging, and a softwaredefined conference room solution into one easy-to-use platform. Zoom offers the best video, audio, and wireless

More information

NIELSEN API PORTAL USER REGISTRATION GUIDE

NIELSEN API PORTAL USER REGISTRATION GUIDE NIELSEN API PORTAL USER REGISTRATION GUIDE 1 INTRODUCTION In order to access the Nielsen API Portal services, there are three steps that need to be followed sequentially by the user: 1. User Registration

More information

Instant Messaging Compliance for the IM and Presence Service, Release 12.0(1)

Instant Messaging Compliance for the IM and Presence Service, Release 12.0(1) Instant Messaging Compliance for the IM and Presence Service, Release 12.0(1) First Published: 2017-08-17 Last Modified: 2017-11-30 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose,

More information

Developing Microsoft Azure Solutions (70-532) Syllabus

Developing Microsoft Azure Solutions (70-532) Syllabus Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages

More information

JIRA Integration Guide

JIRA Integration Guide JIRA Integration Guide 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective

More information

Product Specification. Design Team C, COMP 410 Spring 2016

Product Specification. Design Team C, COMP 410 Spring 2016 Product Specification Design Team C, COMP 410 Spring 2016 1. Introduction 1.1. Purpose This document defines the high level specifications and architecture of our system as well as the interactions between

More information

Information Security Policy

Information Security Policy Information Security Policy Information Security is a top priority for Ardoq, and we also rely on the security policies and follow the best practices set forth by AWS. Procedures will continuously be updated

More information

Software Design Description Report

Software Design Description Report 2015 Software Design Description Report CodeBenders Haldun Yıldız 1819663 Onur Aydınay 1819002 Deniz Can Yüksel 1819697 Ali Şihab Akcan 1818871 TABLE OF CONTENTS 1 Overview... 3 1.1 Scope... 3 1.2 Purpose...

More information

Developing Microsoft Azure Solutions (70-532) Syllabus

Developing Microsoft Azure Solutions (70-532) Syllabus Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages

More information

Developing Microsoft Azure Solutions (70-532) Syllabus

Developing Microsoft Azure Solutions (70-532) Syllabus Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages

More information

kalmstrom.com Business Solutions

kalmstrom.com Business Solutions Contents 1 INTRODUCTION... 2 1.1 LANGUAGES... 2 1.2 REQUIREMENTS... 2 2 THE SHAREPOINT SITE... 3 2.1 PERMISSIONS... 3 3 CONVERTED E-MAILS AND SHAREPOINT TICKETS... 4 3.1 THE CONVERTED E-MAIL... 4 3.2 THE

More information

Solace JMS Broker Delivers Highest Throughput for Persistent and Non-Persistent Delivery

Solace JMS Broker Delivers Highest Throughput for Persistent and Non-Persistent Delivery Solace JMS Broker Delivers Highest Throughput for Persistent and Non-Persistent Delivery Java Message Service (JMS) is a standardized messaging interface that has become a pervasive part of the IT landscape

More information

FIREFLY ARCHITECTURE: CO-BROWSING AT SCALE FOR THE ENTERPRISE

FIREFLY ARCHITECTURE: CO-BROWSING AT SCALE FOR THE ENTERPRISE FIREFLY ARCHITECTURE: CO-BROWSING AT SCALE FOR THE ENTERPRISE Table of Contents Introduction... 2 Architecture Overview... 2 Supported Browser Versions and Technologies... 3 Firewalls and Login Sessions...

More information

Pexip Infinity and Amazon Web Services Deployment Guide

Pexip Infinity and Amazon Web Services Deployment Guide Pexip Infinity and Amazon Web Services Deployment Guide Contents Introduction 1 Deployment guidelines 2 Configuring AWS security groups 4 Deploying a Management Node in AWS 6 Deploying a Conferencing Node

More information

Deploying OAuth with Cisco Collaboration Solution Release 12.0

Deploying OAuth with Cisco Collaboration Solution Release 12.0 White Paper Deploying OAuth with Cisco Collaboration Solution Release 12.0 Authors: Bryan Morris, Kevin Roarty (Collaboration Technical Marketing) Last Updated: December 2017 This document describes the

More information

Administrator Guide Administrator Guide

Administrator Guide Administrator Guide AutobotAI account setup process with AWS account linking In order to provide AWS account access to autobotai skill, It has to be configured in https://autobot.live portal. Currently only one account can

More information

Equitrac Integrated for Océ

Equitrac Integrated for Océ Equitrac Integrated for Océ 1.2 Setup Guide 2014 Equitrac Integrated for Océ Setup Guide Document History Revision Date Revision List November 2, 2012 Updated for Equitrac Office/Express version 4.2.5

More information

Integrated for Océ Setup Guide

Integrated for Océ Setup Guide Integrated for Océ Setup Guide Version 1.2 2016 OCE-20160914 Equitrac Integrated for Océ Setup Guide Document History Revision Date September 14, 2016 Revision List New supported devices/card reader web

More information

Getting Started Guide. VMware NSX Cloud services

Getting Started Guide. VMware NSX Cloud services VMware NSX Cloud services You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation, submit your feedback

More information

BMC FootPrints 12 Integration with Remote Support

BMC FootPrints 12 Integration with Remote Support BMC FootPrints 12 Integration with Remote Support 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks are

More information

StreamSets Control Hub Installation Guide

StreamSets Control Hub Installation Guide StreamSets Control Hub Installation Guide Version 3.2.1 2018, StreamSets, Inc. All rights reserved. Table of Contents 2 Table of Contents Chapter 1: What's New...1 What's New in 3.2.1... 2 What's New in

More information

Developing Solutions for Google Cloud Platform (CPD200) Course Agenda

Developing Solutions for Google Cloud Platform (CPD200) Course Agenda Developing Solutions for Google Cloud Platform (CPD200) Course Agenda Module 1: Developing Solutions for Google Cloud Platform Identify the advantages of Google Cloud Platform for solution development

More information

Developing Enterprise Cloud Solutions with Azure

Developing Enterprise Cloud Solutions with Azure Developing Enterprise Cloud Solutions with Azure Java Focused 5 Day Course AUDIENCE FORMAT Developers and Software Architects Instructor-led with hands-on labs LEVEL 300 COURSE DESCRIPTION This course

More information

PASSPORTAL PLUGIN DOCUMENTATION

PASSPORTAL PLUGIN DOCUMENTATION Contents Requirements... 2 Install or Update Passportal Plugin Solution Center... 3 Configuring Passportal Plugin... 5 Client mapping... 6 User Class Configuration... 7 About the Screens... 8 Passportal

More information

Equitrac Integrated for Konica Minolta. Setup Guide Equitrac Corporation

Equitrac Integrated for Konica Minolta. Setup Guide Equitrac Corporation Equitrac Integrated for Konica Minolta 1.2 Setup Guide 2012 Equitrac Corporation Equitrac Integrated for Konica Minolta Setup Guide Document Revision History Revision Date Revision List November 1, 2012

More information

Authors: Rostislav Pinski, Dmitry Kaganov, Eli Shtein, Alexander Gorohovski. Version 1.1. Preventing Data Leakage via

Authors: Rostislav Pinski, Dmitry Kaganov, Eli Shtein, Alexander Gorohovski. Version 1.1. Preventing Data Leakage via Ben Gurion University Deutsche Telekom Labs Authors: Rostislav Pinski, Dmitry Kaganov, Eli Shtein, Alexander Gorohovski Version 1.1 1 1. Introduction...4-16 1.1 Vision...4 1.2 The Problem Domain...5-6

More information

Single Sign-On for PCF. User's Guide

Single Sign-On for PCF. User's Guide Single Sign-On for PCF Version 1.2 User's Guide 2018 Pivotal Software, Inc. Table of Contents Table of Contents Single Sign-On Overview Installation Getting Started with Single Sign-On Manage Service Plans

More information

Chapter 2 WEBLOGIC SERVER DOMAINS. SYS-ED/ Computer Education Techniques, Inc.

Chapter 2 WEBLOGIC SERVER DOMAINS. SYS-ED/ Computer Education Techniques, Inc. Chapter 2 WEBLOGIC SERVER DOMAINS SYS-ED/ Computer Education Techniques, Inc. Objectives You will learn: Domain - concept and implementation. Content of a domain. Common domain types. Production versus

More information

CN Assignment I. 1. With an example explain how cookies are used in e-commerce application to improve the performance.

CN Assignment I. 1. With an example explain how cookies are used in e-commerce application to improve the performance. CN Assignment I 1. With an example explain how cookies are used in e-commerce application to improve the performance. In an e-commerce application, when the user sends a login form to the server, the server

More information

<Insert Picture Here> WebLogic JMS Messaging Infrastructure WebLogic Server 11gR1 Labs

<Insert Picture Here> WebLogic JMS Messaging Infrastructure WebLogic Server 11gR1 Labs WebLogic JMS Messaging Infrastructure WebLogic Server 11gR1 Labs Messaging Basics Built-in Best-of-Breed Messaging (JMS) Engine Years of hardening. Strong performance.

More information

System and Software Architecture Description (SSAD)

System and Software Architecture Description (SSAD) System and Software Architecture Description (SSAD) FlowerSeeker Team 05 Name Eder Figueroa Sophia Wu Doris Lam Hiram Garcia Roles Primary Role: Project Manager/ Implementer. Secondary Role: Tester. Primary

More information

Authenticatr. Two-factor authentication made simple for Windows network environments. Version 0.9 USER GUIDE

Authenticatr. Two-factor authentication made simple for Windows network environments. Version 0.9 USER GUIDE Authenticatr Two-factor authentication made simple for Windows network environments Version 0.9 USER GUIDE Authenticatr Page 1 Contents Contents... 2 Legal Stuff... 3 About Authenticatr... 4 Installation

More information

Phone Customization Manager

Phone Customization Manager Phone Customization Manager User Guide Release 7.0 May 16 2016 Table of Contents Introduction... 3 Workstation Requirements... 3 Network Connectivity Requirements... 3 Licensing Requirements... 3 Login

More information

Nirvana A Technical Introduction

Nirvana A Technical Introduction Nirvana A Technical Introduction Cyril PODER, ingénieur avant-vente June 18, 2013 2 Agenda Product Overview Client Delivery Modes Realm Features Management and Administration Clustering & HA Scalability

More information

5 OAuth Essentials for API Access Control

5 OAuth Essentials for API Access Control 5 OAuth Essentials for API Access Control Introduction: How a Web Standard Enters the Enterprise OAuth s Roots in the Social Web OAuth puts the user in control of delegating access to an API. This allows

More information

Author: Group 03 Yuly Suvorov, Luke Harvey, Ben Holland, Jordan Cook, Michael Higdon. All Completed SRS2 Steps

Author: Group 03 Yuly Suvorov, Luke Harvey, Ben Holland, Jordan Cook, Michael Higdon. All Completed SRS2 Steps Software Requirements Document for Graffiti Author: Group 03 Yuly Suvorov, Luke Harvey, Ben Holland, Jordan Cook, Michael Higdon Version Date Author Change 0.1 09/13/ SM Initial Document 07 0.2 09/22/

More information

CPM. Quick Start Guide V2.4.0

CPM. Quick Start Guide V2.4.0 CPM Quick Start Guide V2.4.0 1 Content 1 Introduction... 3 Launching the instance... 3 CloudFormation... 3 CPM Server Instance Connectivity... 3 2 CPM Server Instance Configuration... 4 CPM Server Configuration...

More information

Partner Center: Secure application model

Partner Center: Secure application model Partner Center: Secure application model The information provided in this document is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including

More information

CLUSTERING HIVEMQ. Building highly available, horizontally scalable MQTT Broker Clusters

CLUSTERING HIVEMQ. Building highly available, horizontally scalable MQTT Broker Clusters CLUSTERING HIVEMQ Building highly available, horizontally scalable MQTT Broker Clusters 12/2016 About this document MQTT is based on a publish/subscribe architecture that decouples MQTT clients and uses

More information

Course: JBoss Training: JBoss AS 7 and JBoss EAP 6 Administration and Clustering Training

Course: JBoss Training: JBoss AS 7 and JBoss EAP 6 Administration and Clustering Training Course: JBoss Training: JBoss AS 7 and JBoss EAP 6 Administration and Clustering Training Course Length: Duration; 4 days Course Code: WA 2060 This training course covers both the unsupported open source

More information

StoneFax provides the Print To Fax feature to any user who is in the same Windows Domain of the StoneFax server.

StoneFax provides the Print To Fax feature to any user who is in the same Windows Domain of the StoneFax server. Print To Fax StoneFax provides the Print To Fax feature to any user who is in the same Windows Domain of the StoneFax server. Note: StoneFax and the client PC using this feature must be in the same Windows

More information

Release for Microsoft Windows

Release for Microsoft Windows [1]Oracle Fail Safe Tutorial Release 4.1.1 for Microsoft Windows E57061-02 April 2015 Oracle Fail Safe Tutorial, Release 4.1.1 for Microsoft Windows E57061-02 Copyright 1999, 2015, Oracle and/or its affiliates.

More information

Microsoft Dynamics CRM Integration with Bomgar Remote Support

Microsoft Dynamics CRM Integration with Bomgar Remote Support Microsoft Dynamics CRM Integration with Bomgar Remote Support 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown

More information

Getting Started Guide. Prepared by-fatbit Technologies

Getting Started Guide. Prepared by-fatbit Technologies Getting Started Guide Prepared by-fatbit Technologies 1 Contents 1. Manage Settings... 3 1.1. General... 4 1.2. Local... 6 1.3. SEO... 7 1.4. Option... 8 1.5. Live Chat... 19 1.6. Third Part API s... 20

More information

October J. Polycom Cloud Services Portal

October J. Polycom Cloud Services Portal October 2018 3725-42461-001J Polycom Cloud Services Portal Copyright 2018, Polycom, Inc. All rights reserved. No part of this document may be reproduced, translated into another language or format, or

More information

Document Sub Title. Yotpo. Technical Overview 07/18/ Yotpo

Document Sub Title. Yotpo. Technical Overview 07/18/ Yotpo Document Sub Title Yotpo Technical Overview 07/18/2016 2015 Yotpo Contents Introduction... 3 Yotpo Architecture... 4 Yotpo Back Office (or B2B)... 4 Yotpo On-Site Presence... 4 Technologies... 5 Real-Time

More information

BEAWebLogic RFID. Edge Server. Using the Administration Console

BEAWebLogic RFID. Edge Server. Using the Administration Console BEAWebLogic RFID Edge Server Using the Administration Console Version 2.1 Revised: June 29, 2006 Contents 1. Introduction and Roadmap Document Scope and Audience.............................................

More information

Privileged Access Management Administrative Guide 15.1

Privileged Access Management Administrative Guide 15.1 Privileged Access Management Administrative Guide 15.1 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are

More information

VMware Notification Service v2.0 Installation and Configuration Guide Configure ENS2 for cloud and on-premises deployments

VMware  Notification Service v2.0 Installation and Configuration Guide Configure ENS2 for cloud and on-premises deployments VMware Email Notification Service v2.0 Installation and Configuration Guide Configure ENS2 for cloud and on-premises deployments Workspace ONE UEM v9.7 Have documentation feedback? Submit a Documentation

More information

SAS Event Stream Processing 4.3: Visualizing Event Streams with Streamviewer

SAS Event Stream Processing 4.3: Visualizing Event Streams with Streamviewer SAS Event Stream Processing 4.3: Visualizing Event Streams with Streamviewer Overview Streamviewer provides a user interface that enables you to subscribe to window event streams from one or more event

More information

Sectigo Accounts Management

Sectigo Accounts Management Sectigo Accounts Management Software Version 7.0 User Guide Guide Version 7.0.030414 2018 Sectigo. All rights reserved. Table of Contents 1. Introduction To Sectigo Accounts Management...3 2. My Account...5

More information

Phone Inventory 1.1 (1012)

Phone Inventory 1.1 (1012) (1012) 2015 VoIP Integration July 28, 2015 Table of Contents Product Overview... 3 Requirements... 3 Application Requirements... 3 Call Manager... 3 Network Connectivity... 3 IP Phones... 3 Installation

More information

Core Solutions of Microsoft Skype for Business 2015

Core Solutions of Microsoft Skype for Business 2015 Course 20334: Core Solutions of Microsoft Skype for Business 2015 Course Outline Module 1: Installing and Implementing Skype for Business Server 2015 This module helps you to identify the external dependencies

More information

Enhancing cloud applications by using messaging services IBM Corporation

Enhancing cloud applications by using messaging services IBM Corporation Enhancing cloud applications by using messaging services After you complete this section, you should understand: Messaging use cases, benefits, and available APIs in the Message Hub service Message Hub

More information

Using ANM With Virtual Data Centers

Using ANM With Virtual Data Centers APPENDIXB Date: 3/8/10 This appendix describes how to integrate ANM with VMware vcenter Server, which is a third-party product for creating and managing virtual data centers. Using VMware vsphere Client,

More information

Oracle Communications Services Gatekeeper

Oracle Communications Services Gatekeeper Oracle Communications Services Gatekeeper Security Guide Release 5.1 E36134-01 June 2013 Oracle Communications Services Gatekeeper Security Guide, Release 5.1 E36134-01 Copyright 2011, 2013, Oracle and/or

More information

Cloud FastPath: Highly Secure Data Transfer

Cloud FastPath: Highly Secure Data Transfer Cloud FastPath: Highly Secure Data Transfer Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. Tervela has been creating high performance

More information

Senior Project: Calendar

Senior Project: Calendar Senior Project: Calendar By Jason Chin June 2, 2017 Contents 1 Introduction 1 2 Vision and Scope 2 2.1 Business Requirements...................... 2 2.1.1 Background........................ 2 2.1.2 Business

More information

Microsoft Dynamics CRM Integration with Remote Support

Microsoft Dynamics CRM Integration with Remote Support Microsoft Dynamics CRM Integration with Remote Support 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property

More information

Remote Support 19.1 Web Rep Console

Remote Support 19.1 Web Rep Console Remote Support 19.1 Web Rep Console 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks are the property

More information

Mobile Client. User Manual. Version: 2.0.0

Mobile Client. User Manual. Version: 2.0.0 Mobile Client User Manual Version: 2.0.0 Index Sr. No. Topic Page 1 Requirement 3 2 How to use Mobile Client 4 3 Compose Message 5 4 Select Contacts 6 5 Manage Contacts 17 6 Manage Distribution List 23

More information

Work with the Outreach App. Schoolwires Centricity2

Work with the Outreach App. Schoolwires Centricity2 Work with the Centricity2 Trademark Notice, the logos, and the unique trade dress of are the trademarks, service marks, trade dress and logos of, Inc. All other trademarks, service marks, trade dress and

More information

VMware Notification Service v2.0 Installation and Configuration Guide Configure ENS2 for cloud and on-premises deployments

VMware  Notification Service v2.0 Installation and Configuration Guide Configure ENS2 for cloud and on-premises deployments VMware Email Notification Service v2.0 Installation and Configuration Guide Configure ENS2 for cloud and on-premises deployments Workspace ONE UEM v1810 Have documentation feedback? Submit a Documentation

More information

271 Waverley Oaks Rd. Telephone: Suite 206 Waltham, MA USA

271 Waverley Oaks Rd. Telephone: Suite 206 Waltham, MA USA Contacting Leostream Leostream Corporation http://www.leostream.com 271 Waverley Oaks Rd. Telephone: +1 781 890 2019 Suite 206 Waltham, MA 02452 USA To submit an enhancement request, email features@leostream.com.

More information

AdvOSS AAA: Architecture, Call flows and implementing emerging business use cases

AdvOSS AAA: Architecture, Call flows and implementing emerging business use cases AdvOSS AAA: Architecture, Call flows and implementing emerging business use cases An AdvOSS White Paper Latest version of this white paper can always be found at http://advoss.com/resources/whitepapers/advoss-aaa-workflows.pdf

More information

Solace JMS Integration with Red Hat JBoss Fuse (6.0)

Solace JMS Integration with Red Hat JBoss Fuse (6.0) Solace JMS Integration with Red Hat JBoss Fuse (6.0) Document Version 1.0 September, 2014 This document is an integration guide for using Solace JMS as a JMS provider in Red Hat JBoss Fuse. Red Hat JBoss

More information

Laserfiche Rio 10.3: Deployment Guide. White Paper

Laserfiche Rio 10.3: Deployment Guide. White Paper Laserfiche Rio 10.3: Deployment Guide White Paper January 2018 Table of Contents How Laserfiche Licensing Works... 4 Types of Licenses... 4 Named User Licenses... 4 WebLink Public Portal Licenses... 6

More information

Securing Amazon Web Services (AWS) EC2 Instances with Dome9. A Whitepaper by Dome9 Security, Ltd.

Securing Amazon Web Services (AWS) EC2 Instances with Dome9. A Whitepaper by Dome9 Security, Ltd. Securing Amazon Web Services (AWS) EC2 Instances with Dome9 A Whitepaper by Dome9 Security, Ltd. Amazon Web Services (AWS) provides business flexibility for your company as you move to the cloud, but new

More information

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3. Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on

More information

TIBCO API Exchange Manager

TIBCO API Exchange Manager TIBCO API Exchange Manager Release Notes Software Release 2.1.0 March 2014 Two-Second Advantage Important Information SSOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR

More information

Citrix Cloud Resource Locations

Citrix Cloud Resource Locations Citrix Cloud Resource Locations Oct 13, 2017 In Citrix Cloud, resource locations contain the resources you manage such as hypervisors, Cloud Connectors, and VDAs. For an overview, see What are resource

More information

VST Hospital Administrator Guide. Version 2.0.4

VST Hospital Administrator Guide. Version 2.0.4 VST Hospital Administrator Guide Version 2.0.4 Notice Copyright 2002- Vocera Communications, Inc. All rights reserved. Vocera is a registered trademark of Vocera Communications, Inc. This software is licensed,

More information

OCS INSTALLATION GUIDE

OCS INSTALLATION GUIDE OCS INSTALLATION GUIDE 1. Application database preparation... 2 1.1. Oracle Database 11g... 2 1.2 MySQL 5.5+... 2 2. System initialisation... 3 2.1. Application file storage... 3 2.2. Security tool installation...

More information

Table of Contents. Revision History. 1. Introduction Purpose Document Conventions Intended Audience and Reading Suggestions4

Table of Contents. Revision History. 1. Introduction Purpose Document Conventions Intended Audience and Reading Suggestions4 Software Requirements Specification for Python Checker Version 1.0 approved Prepared by Matthew Arnold, Seong, Ian Computer Science Team 4 February 4th 2015 Table of Contents Table of Contents Revision

More information

Google Sync Integration Guide. VMware Workspace ONE UEM 1902

Google Sync Integration Guide. VMware Workspace ONE UEM 1902 Google Sync Integration Guide VMware Workspace ONE UEM 1902 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation,

More information

Lightstreamer. The Streaming-Ajax Revolution. Product Insight

Lightstreamer. The Streaming-Ajax Revolution. Product Insight Lightstreamer The Streaming-Ajax Revolution Product Insight 1 Agenda Paradigms for the Real-Time Web (four models explained) Requirements for a Good Comet Solution Introduction to Lightstreamer Lightstreamer

More information

SCALE AND SECURE MOBILE / IOT MQTT TRAFFIC

SCALE AND SECURE MOBILE / IOT MQTT TRAFFIC APPLICATION NOTE SCALE AND SECURE MOBILE / IOT TRAFFIC Connecting millions of devices requires a simple implementation for fast deployments, adaptive security for protection against hacker attacks, and

More information

Web Console Setup & User Guide. Version 7.1

Web Console Setup & User Guide. Version 7.1 Web Console Setup & User Guide Version 7.1 1 Contents Page Number Chapter 1 - Installation and Access 3 Server Setup Client Setup Windows Client Setup Mac Client Setup Linux Client Setup Interoperation

More information

CA Service Desk Integration with Remote Support

CA Service Desk Integration with Remote Support CA Service Desk Integration with Remote Support 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks are the

More information

Assure Self-Service Portal

Assure Self-Service Portal Assure Self-Service Portal Assure Self-Service Portal is a web-based portal, where Customers are able to: Record Cases to Assure Support 24/7 View existing and past Cases Find solutions to known issues

More information

PAS for OpenEdge Support for JWT and OAuth Samples -

PAS for OpenEdge Support for JWT and OAuth Samples - PAS for OpenEdge Support for JWT and OAuth 2.0 - Samples - Version 1.0 November 21, 2017 Copyright 2017 and/or its subsidiaries or affiliates. All Rights Reserved. 2 TABLE OF CONTENTS INTRODUCTION... 3

More information

Installing and Configuring Extension Mobility Using Either: Extended Services 2.2; CRA 2.2 or CRS 3.0(2) and CallManager 3.2

Installing and Configuring Extension Mobility Using Either: Extended Services 2.2; CRA 2.2 or CRS 3.0(2) and CallManager 3.2 Cisco - Installing and Configuring Extension Mobility Using Either: Extended Services 2... Page 1 of 90 Installing and Configuring Extension Mobility Using Either: Extended Services 2.2; CRA 2.2 or CRS

More information

Contract Information Management System (CIMS) Technical System Architecture

Contract Information Management System (CIMS) Technical System Architecture Technical System REVISION HISTORY REVISION NUMBER ISSUE DATE PRIMARY AUTHOR(S) NOTES 1.0 2/2015 Cheryl Kelmar Software: Kami Phengphet Engineer: Pornpat Nikamanon Architect: Jim Zhou Creation of CIMS document.

More information

Equitrac Embedded for Kyocera Mita. Setup Guide Equitrac Corporation Equitrac Corporation

Equitrac Embedded for Kyocera Mita. Setup Guide Equitrac Corporation Equitrac Corporation Equitrac Embedded for Kyocera Mita 1.3 Setup Guide 2012 Equitrac Corporation 2012 Equitrac Corporation Equitrac Embedded for Kyocera Mita Setup Guide Document Revision History Revision Date Revision List

More information

CPM Quick Start Guide V2.2.0

CPM Quick Start Guide V2.2.0 CPM Quick Start Guide V2.2.0 1 Content 1 Introduction... 3 1.1 Launching the instance... 3 1.2 CPM Server Instance Connectivity... 3 2 CPM Server Instance Configuration... 3 3 Creating a Simple Backup

More information

OPC UA Configuration Manager PTC Inc. All Rights Reserved.

OPC UA Configuration Manager PTC Inc. All Rights Reserved. 2017 PTC Inc. All Rights Reserved. 2 Table of Contents 1 Table of Contents 2 4 Overview 4 5 Project Properties - OPC UA 5 Server Endpoints 7 Trusted Clients 9 Discovery Servers 10 Trusted Servers 11 Instance

More information

Overview. Borland VisiBroker 7.0

Overview. Borland VisiBroker 7.0 Overview Borland VisiBroker 7.0 Borland Software Corporation 20450 Stevens Creek Blvd., Suite 800 Cupertino, CA 95014 USA www.borland.com Refer to the file deploy.html for a complete list of files that

More information

Enterprise print management in VMware Horizon

Enterprise print management in VMware Horizon Enterprise print management in VMware Horizon Introduction: Embracing and Extending VMware Horizon Tricerat Simplify Printing enhances the capabilities of VMware Horizon environments by enabling reliable

More information

Oracle WebLogic Server 11g: Administration Essentials

Oracle WebLogic Server 11g: Administration Essentials Oracle University Contact Us: +33 (0) 1 57 60 20 81 Oracle WebLogic Server 11g: Administration Essentials Duration: 5 Days What you will learn This Oracle WebLogic Server 11g: Administration Essentials

More information

Application Container Cloud

Application Container Cloud APPLICATION CONTAINER CLOUD Application Container Cloud with Java SE and Node The Best Java SE and Node Cloud. Get the choice of either Oracle Java SE Advanced, including Flight Recorder for production

More information

Oracle Responsys. Release 18B. New Feature Summary ORACLE

Oracle Responsys. Release 18B. New Feature Summary ORACLE Oracle Responsys Release 18B New Feature Summary ORACLE TABLE OF CONTENTS Revision History 4 Overview 4 APIs 4 New Throttling Limits for Web Services APIs 4 New Asynchronous Web Services APIs 5 New REST

More information

TECHNICAL WHITE PAPER DECEMBER 2017 VMWARE HORIZON CLOUD SERVICE ON MICROSOFT AZURE SECURITY CONSIDERATIONS. White Paper

TECHNICAL WHITE PAPER DECEMBER 2017 VMWARE HORIZON CLOUD SERVICE ON MICROSOFT AZURE SECURITY CONSIDERATIONS. White Paper TECHNICAL WHITE PAPER DECEMBER 2017 VMWARE HORIZON CLOUD SERVICE ON MICROSOFT AZURE SECURITY CONSIDERATIONS White Paper Table of Contents Executive Summary... 3 Audience.... 3 Introduction.... 3 Architecture....

More information

Web Design and Applications

Web Design and Applications Web Design and Applications JEE, Message-Driven Beans Gheorghe Aurel Pacurar JEE, Message-Driven Beans Java Message Service - JMS Server JMS is a standard Java API that allows applications to create, send,

More information

Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1

Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1 Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1 Setting Up Resources in VMware Identity Manager (On Premises) You can find the most up-to-date

More information

Software Release Communication 02/07/2014. Topics covered. Solutions You Can Count On

Software Release Communication 02/07/2014. Topics covered. Solutions You Can Count On Topics covered Vea Web... 2 User Access Changes... 4 Dashboard Sharing... 7 Component Upgrade... 8 System Manager Geocode Function... 9 Installer Changes... 11 VEA WEB The initial version of Vea Web, included

More information

BEA WebLogic. Server. MedRec Clustering Tutorial

BEA WebLogic. Server. MedRec Clustering Tutorial BEA WebLogic Server MedRec Clustering Tutorial Release 8.1 Document Date: February 2003 Revised: July 18, 2003 Copyright Copyright 2003 BEA Systems, Inc. All Rights Reserved. Restricted Rights Legend This

More information

System and Software Architecture Description (SSAD)

System and Software Architecture Description (SSAD) System and Software Architecture Description (SSAD) FlowerSeeker Team 05 Name Eder Figueroa Sophia Wu Doris Lam Hiram Garcia Roles Primary Role: Project Manager/ Implementer. Secondary Role: Tester. Primary

More information

SETUP GUIDE PPP FOR PPP USERS PLANT PROTECTION PRODUCTS VERSION 0.4

SETUP GUIDE PPP FOR PPP USERS PLANT PROTECTION PRODUCTS VERSION 0.4 SETUP GUIDE FOR PPP USERS VERSION 0.4 PPP PLANT PROTECTION PRODUCTS TABLE OF CONTENTS 1. INTRODUCTION... 3 2. STEP 1: CREATING YOUR ECAS ACCOUNT... 4 3. STEP 2: REQUESTING ACCESS TO THE APPLICATION...

More information

Mobile ios Configuration Guide

Mobile ios Configuration Guide Mobile ios Configuration Guide Version 23 SP-WX-MBLIOS-CG-201807--R023.00 Sage 2018. All rights reserved. This document contains information proprietary to Sage and may not be reproduced, disclosed, or

More information